Memlock: Memory usage guided fuzzing

C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu… - Proceedings of the …, 2020 - dl.acm.org
Uncontrolled memory consumption is a kind of critical software security weaknesses. It can
also become a security-critical vulnerability when attackers can take control of the input to …

Deter-Pay: A deterministic routing protocol in concurrent payment channel network

Q Cai, J Chen, D Luo, G Sun, H Yu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Payment channel networks (PCNs) have emerged as a leading solution to address the
scalability problem of blockchain-based cryptocurrencies. Within a PCN, two parties can …

Automated patching for unreproducible builds

Z Ren, S Sun, J Xuan, X Li, Z Zhou… - Proceedings of the 44th …, 2022 - dl.acm.org
Software reproducibility plays an essential role in establishing trust between source code
and the built artifacts, by comparing compilation outputs acquired from independent users …

[PDF][PDF] Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

AE Abdallah, M Hamdan, S Abd Razak… - Comput. Mater …, 2023 - eprints.utm.my
IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to
vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the …

Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML

D Schubert, H Eikerling, J Holtmann - Frontiers in Computer Science, 2021 - frontiersin.org
Modern and flexible application-level software platforms increase the attack surface of
connected vehicles and thereby require automotive engineers to adopt additional security …

[PDF][PDF] Estimating worst-case resource usage by resource-usage-aware fuzzing

L Chen, R Huang, D Luo, C Ma, D Wei… - … Approaches to Software …, 2022 - library.oapen.org
Worst-case resource usage provides a useful guidance in the design, configuration and
deployment of software, especially when it runs under a context with limited amount of …

Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

A Elhigazi Abdallah, M Hamdan… - … , Materials & Continua, 2022 - clok.uclan.ac.uk
IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to
vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the …

[PDF][PDF] Elhigazi Abdallah, Abdallah, Hamdan, Mosab, Abd Razak, Shukor, A. Ghalib, Fuad, Hamzah, Muzaffar, Khan, Suleman, Ahmed Babikir Ali, Siddiq, HH Khairi …

E Abdallah - core.ac.uk
IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to
vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the …

Efficient Resource Management on Container as a Service

PCH Park - rshare.library.torontomu.ca
Docker has been widely adopted as a platform solution for microservice. As the popularity of
microservice increases, the importance of fine-tuning the efficiency of resource management …

[图书][B] Application-aware intrusion detection

D Schubert, H Eikerling, J Holtmann - 2019 - researchgate.net
Modern and flexible application-level software platforms increase the attack surface of
connected vehicles and thereby require automotive engineers to adopt additional security …